What is CybOX?
What is CybOX? It is a specification for an application layer protocol that allows the communication of CTI over HTTPS. It is a set of standardized schemata for specifying, capturing,…
What is CybOX? It is a specification for an application layer protocol that allows the communication of CTI over HTTPS. It is a set of standardized schemata for specifying, capturing,…
Which statement describes Trusted Automated Exchange of Indicator Information (TAXII)? It is a dynamic database of real-time vulnerabilities. It is a set of specifications for exchanging cyber threat information between…
Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data? Cisco Talos MITRE FireEye DHS Answers Explanation & Hints: The United States…
How does FireEye detect and prevent zero-day attacks? by keeping a detailed analysis of all viruses and malware by establishing an authentication parameter prior to any data exchange by only…
What is the primary function of the Center for Internet Security (CIS)? to provide vendor-neutral education products and career services to industry professionals worldwide to provide a security news portal…
How does AIS address a newly discovered threat? by enabling real-time exchange of cyberthreat indicators with U.S. Federal Government and the private sector by creating response strategies against the new…
What three goals does a BYOD security policy accomplish? (Choose three.) identify safeguards to put in place if a device is compromised describe the rights to access and activities permitted…
Which type of security attack would attempt a buffer overflow? reconnaissance ransomware DoS scareware Answers Explanation & Hints: Denial of service (DoS) attacks attempt to disrupt service on the network…
Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall? Trojan horse brute-force attack DoS buffer overflow Explanation: A Trojan horse is software…
Which field in the IPv6 header points to optional network layer information that is carried in the IPv6 packet? version traffic class flow label next header Explanation & Hint: Optional…
Which statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration? An administrator can assign an interface to multiple security…
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? SQL injection XML injection Cross-site scripting buffer overflow Explanation & Hint: Cross-site scripting (XSS)…
An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this? DHCP…
What kind of ICMP message can be used by threat actors to create a man-in-the-middle attack? ICMP unreachable ICMP mask reply ICMP echo request ICMP redirects Explanation & Hint: Common…
Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device? man-in-the-middle DNS…
Which of the following characteristics describe a worm? Select two correct answers Infects computers by attaching to software code Executes when software is run on a computer Is self-replicating Travels…
What are two examples of DoS attacks? (Choose two.) buffer overflow SQL injection ping of death port scanning phishing Answers Explanation & Hints: The buffer overflow and ping of death…
Match the type of cyberattackers to the description. (Not all options are used.) Explanation & Hint: State-sponsored attackers: These are individuals or groups that gather intelligence or commit sabotage on…
Which statement describes the function of the SPAN tool used in a Cisco switch? It supports the SNMP trap operation on a switch. It provides interconnection between VLANs over multiple…
A user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.) The computer beeps once during the…